First published: Thu Sep 06 2012(Updated: )
Directory traversal vulnerability in Open-Realty CMS 2.5.8 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the select_users_template parameter to index.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open-Realty | <=2.5.8 | |
Open-Realty | =2.3.1 | |
Open-Realty | =2.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1112 is considered a medium severity vulnerability due to its ability to allow remote file inclusion.
To fix CVE-2012-1112, upgrade Open-Realty CMS to version 2.5.9 or later, which addresses this vulnerability.
CVE-2012-1112 affects Open-Realty CMS versions 2.5.8 and earlier, including specific versions like 2.3.1 and 2.3.4.
CVE-2012-1112 allows attackers to perform a directory traversal attack, potentially leading to the execution of arbitrary local files.
Yes, user data can be at risk with CVE-2012-1112 as it may enable attackers to access sensitive files on the server.